Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New in Veracode Fix: Additional Language Support and Batch Fix

We’re excited to bring you two significant updates to Veracode Fix: our AI-powered security flaw remediation tool. Since we launched Fix nearly a year ago, two requests have dominated our customer feedback: We recently launched a new version of Veracode Scan for VS Code that included Fix (with more IDE’s to follow), which answered some of those requests, and now we’re updating Fix to cover more languages and a new mode that will automatically apply the top-ranked fix.

Quick Guide to the OWASP OSS Risk Top 10

CVEs, or known and cataloged software vulnerabilities, dominate the discussion about open source software (OSS) risk. In 2016, 6,457 CVEs were reported. That number has grown every year since, reaching 28,961 CVEs reported in 2023—an increase of nearly 4.5 times in just seven years. 2024 is already on track to beat 2023, and we will likely see even faster growth once AI is earnestly set to the task of finding vulnerabilities (not to mention creating them).

Manage Exchange Online with Exchange Admin Center

Managing email services efficiently is essential for any organization’s productivity and security in the modern digital workspace. This blog will discuss Exchange Online administrative tasks and how to streamline their management process. Before we discuss how to manage Exchange Online, we’ll explore its history.

Identify, Respond, & Protect - Defending yourself from the newly disclosed Palo Alto PAN-OS CVE

On April 12th, Palo Alto disclosed a vulnerability with a maximum severity rating for the PAN-OS Global Protect Gateway. There was clear evidence that the vulnerability was being actively exploited as early as March 26th. When exploited, this vulnerability enables an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Palo Alto expected patches to be released for tested mitigations to block known attacks on April 14th.

AI-driven cyber attacks to be the norm within a year, say security leaders

New research from Netacea reveals 93% of security leaders expect to face daily AI-driven attacks by the end of this year. Ransomware and phishing attacks are expected to be enhanced by offensive AI, but bots remain an underestimated threat. All respondents are benefiting from AI in their security stack, but adoption of bot management is lagging behind.
Featured Post

Human risk management automation can help beat burnout

Cyber criminals are relentlessly exploiting new technologies to improve their chances of success. As such, security professionals are feeling the pressure of keeping watch against these threats and trying to stay a step ahead of these criminals.
Featured Post

Hacked Creativity? How Cyber Security Threats Impact Artists

The creative industries have undergone a rapid shift thanks to digitisation. The emergence of cutting-edge cloud-based storage, automation and artificial intelligence (AI) tools has allowed creatives from all walks of life to innovate and enhance how they work while alleviating themselves from many arduous, repetitive, and time-consuming tasks.

Combating phishing attacks with passwordless FIDO2 authentication

Attackers predominantly use phishing attacks to steal and misuse user identities. A global Statista study on employee-reported malicious emails revealed that in the first quarter of 2023, 58.2% of malicious emails were credential theft attacks, 40.5% were impersonation attacks, and 1.3% were malware deliveries. Phishing attacks create a sense of urgency and panic in users, who, as a result, easily fall victim to them.

Data Breach Response and Investigation: 8 Steps for Efficient Remediation

From financial losses to legal issues to a damaged reputation, the consequences of a data breach can severely impair organizations. Therefore, having robust data breach incident response and investigation procedures is critical for organizations to mitigate the impact of such incidents. In this article, we review what a data breach is and how it can influence your organization as well as provide eight simple steps to efficiently respond to and investigate data breaches.